Cryptography Module Release Notes for Mule 4
Cryptography module provides cryptography capabilities to a Mule application.
Support Category: Select
2.1.0
January 23, 2026
What’s New
Cryptography Module 2.1.0 enhances compatibility with FIPS 140-3 standards and Java 17, providing more robust validation and improved error handling for secure environments.
-
Improved FIPS 140-3 compatibility with Bouncy Castle FIPS security provider v2+.
-
Added proactive validation of cryptographic algorithms for PGP operations when running in FIPS environments to provide earlier and clearer errors when unsupported algorithms are detected.
-
Deprecated the global XMLDSig security provider registration mechanism which is no longer supported in Java 17 environments.
-
Preserved existing system properties for backward compatibility while marking them as deprecated and discouraged for use in FIPS-bound deployments.
For details about migrating existing applications and understanding FIPS-related limitations, see Upgrading Cryptography Module.
Compatibility
| Software | Version |
|---|---|
Mule |
4.4 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
Enhanced validation and error reporting for PGP operations in FIPS-compliant environments ensure that you receive immediate and clear feedback regarding unsupported configurations. Additionally, global security provider registration issues no longer occur when running in Java 17 environments, which ensures stable cryptographic operations. |
W-20347586 |
The |
W-20671542 |
2.0.0
May 28, 2025
What’s New
Cryptography Module 2.0.0 brings important updates, including:
-
Updating default values for connector operations
-
Migrating your PGP Keyring to AES-Encrypted keys when operating in FIPS mode
-
Using different key pairs for Sign, Encrypt, and Decrypt operations to enhance security
-
Using password-based encryption
-
Using BCFKS as the required keystore and truststore type
-
Specifying algorithms dynamically
-
Registering the XMLDSig Security Provider
-
Enabling compatibility for Decrypt or Validate operations without KDF parameters
For details, refer to Upgrading Cryptography Module.
Compatibility
| Software | Version |
|---|---|
Mule |
4.4 and later |
OpenJDK |
8, 11, and 17 |
1.3.22
November 13, 2024
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The |
W-17024694 |
The |
W-17024694 |
1.3.21
August 15, 2024
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The connector no longer throws the |
W-15108894 |
The |
W-15108894 |
The |
W-15108894 |
1.3.20
February 7, 2024
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
PGP operations now support large payloads. |
W-14118536 |
1.3.19
January 19, 2024
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The PGP Encrypt operation now works correctly. |
W-14792113 |
1.3.18
January 11, 2024
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The org.apache.santuario:xmlsec library is upgraded to version 2.3.4 to address reported security vulnerabilities. |
W-14668416 |
1.3.17
January 9, 2024
What’s New
-
This connector is now compatible with Java 17.
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
OpenJDK |
8, 11, and 17 |
1.3.16
September 20, 2023
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The |
W-13797282 |
1.3.15
September 19, 2023
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The dependency org.bouncycastle:bcpg-jdk18on:1.74 replaces org.bouncycastle:bcpg-jdk15on:1.70. |
W-13844863 |
The dependency org.bouncycastle:bcprov-ext-jdk15to18:1.7, which is no longer in use, is removed to fix security vulnerabilities. |
W-13844863 |
1.3.14
November 16, 2022
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue Resolution | ID |
|---|---|
The Pgp encrypt operation no longer fails when running in a FIPS environment. |
W-11900235 |
1.3.13
November 4, 2022
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue | ID |
|---|---|
Internal dependencies that fix vulnerability issues are updated. |
W-12007146 |
1.3.12
September 26, 2022
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue | ID |
|---|---|
Upgraded bcprov-jdk15on to version 1.70 and bcprov-ext-jdk15to18 to version 1.71 |
W-11676720 |
1.3.11
August 16, 2022
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue | ID |
|---|---|
Security updates applied to internal dependecies. |
W-11550826 |
1.3.10
March 15, 2022
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue | ID |
|---|---|
Security updates applied to internal dependecies. |
W-10583033 |
1.3.9
December 22, 2021
Compatibility
| Software | Version |
|---|---|
Mule |
4.1.1 and later |
Fixed Issues
| Issue | ID |
|---|---|
Cipher |
CRYPT-22 |
1.3.4
1.3.3
1.3.1
1.3.0
September 25, 2019
Features
-
XML Signatures can be verified against certificates contained in the document.
-
It is possible to define an XPath expression to select and verify a signature in an XML document that contains multiple signatures.
-
JCE encryption and decryption use a random initialization vector (IV).
1.1.0
August 20, 2019
Features
-
Implemented atomic encrypt and sign operation for PGP.
-
PGP decryption operation can validate signature if found.
-
All PGP encryption operations now include MDC (modification detection code) by default. Although this is unlikely to cause any issues, you can use the
disableMDCparameter to revert to the previous behavior if needed.



